Tuesday, 30 June 2015

The
secret "shadow" government is the large organisational network
which operates alongside the officially elected and appointed government of
the United States of America. Just as with the official government, the
secret government has functional branches.

Just as
with the official government, the Shadow Government has functional branches. However, unlike
the official government, the purpose of the non-executive branches of the
Shadow Government is simply to distribute various functions, but not to
achieve a system of checks and balances, as was supposed to happen
constitutionally between the executive, legislative and judicial branches of
the U.S. Government. That is because the Shadow Government is a creature of a
powerful elite, who need not fear being dominated by an instrument of their
own creation.

In the
Shadow Government five branches may be identified. These branches are: the
Executive Branch, the Intelligence Branch, the War Department, the Weapons
Industry Branch, and the Financial Department.

The
reporting lines of the Intelligence Branch and the War Department to the
Executive Branch are straightforward and obvious. Intelligence exists to
provide the Executive Branch with sufficient necessary information to make
adequately informed policy decisions. The War Department exists to provide
coercive force to carry out Executive policy decisions which could meet with
public resistance. The Special Operations units within the Intelligence
Branch and War Department exist to carry out policy directives requiring
covert action and official deniability.

The
Weapons Industry Branch reports to the Executive Branch most often
indirectly, through the War Department and/or the Intelligence Branch (for
Black Budget weapons systems).

The
Financial Department theoretically reports to the Executive Branch for fiscal
policy implementation, but de facto also reports directly to the
international power brokers who have created the Shadow Government. The
Financial Department serves at times directly as their instrument of fiscal
policy implementation.

An
analysis of the overall purposes of these five branches suggests that the
overall purpose of the Shadow Government is to exercise covert control by:

1.Collecting
comprehensive institutional and personal information

2.By establishing
national and international policy independently of the established Government

3.By developing high-tech
arms and equipment, and, with these, establishing small, specialized, highly
mobile, elite military units to effect these covert policies, when need
arises, without having to rely on the official (and "unreliable")
Armed Services, (whose subservience to the Shadow Government is reasonably
suspect)

4.By developing an
armed capability to repel any threat to the status quo, (including the
uncertain ontological, social, and economic impacts of any revelation of the
reality of UFO and extraterrestrial presence) through the development of a
Star Wars/BMDO ground and space-based surveillance and SDI weapons network

5.By denying
information compromising to the Shadow Government from all those outside
"need-to-know" policy-making levels

6.By exercising
control on the money supply, availability of credit, and the worth of money,
through policy decisions made outside of the official Government

EXECUTIVE BRANCH

Council on
Foreign Relations

(CFR) includes George Bush, Bill Clinton,
all modern CIA Directors, most modern Joint Chiefs of Staff, most modern
Cabinet and top Executive Branch appointed officeholders, etc.

(NCS), the military and intelligence
policy-making and control group for national and international security,
which reports directly to the President, its secret 5412 Committee (which
directs black [covert] operations), and its PI-40 Subcommittee (aka MJ-12:
which exercises policy direction and control of the UFO Cover-Up).

Joint Chiefs
of Staff

(JCS)'s Special Operations compartment,
the operations directorate which implements the orders of the NSC's 5412
Committee, utilizing the U.S. Special Forces Command.

National Program Office

(NPO), which operates the Continuity of
Government Project (COG), an ongoing secret project to maintain command,
control, communication and intelligence executive centers during an extreme
National Emergency by operating clandestine, secure, underground cities
staffed by surrogates for above ground national leaders.

Federal Emergency
Management Agency

FEMA's black projects compartment, which
operates federal preventive-detention camps [often located on military
bases or Federal Bureau of Land Management lands], secure underground
shelters for the elite during cataclysms, etc.

(NRO) (aka MJ-TF), the
military/intelligence operations arm of the PI-40 Subcommittee, conducts surveillance,
interdiction, capture and confiscation of UFOs and their extra-terrestrial
occupants for intelligence and "International Security" purposes;
surveilles and "interacts" with close encounter experiencers,
including occasional physically and sexually assaultive mind control
kidnappings disguised as "Alien abductions" for psychological
warfare and dis-informational purposes, headquarters unknown, probably
compartmented and dispersed among various elite Delta Force Special
Operations units, such as the USAF Blue Light at Hurlburt Field, Mary
Esther, FL and Beale Air Force Base, Marysville, CA.

Central Intelligence Agency

(CIA), commands, often controls, and
sometimes coordinates, the gathering of secret overseas information
gathered by spies (HUMINT), electronic surveillance (SIGINT), and other
means; carries out covert unconstitutional paramilitary counterinsurgency
operations and preemptive political pacification projects in violation of
international law, as well as counter-intelligence sting operations against
foreign agents; engages in domestic surveillance, and manipulation of the
U.S. political process, "in the National interest" in direct
violation of its congressional charter; operates proprietary "false
front" companies for profit; conducts a major share of international
trans-shipment of illegal drugs, using National Security cover and
immunity; and cooperates with NSA's UFO cover-up operations, Langley, VA,
and worldwide branches.

Federal Bureau of Investigation,
Counter Intelligence Division

The branch which investigates, surveilles
and neutralizes foreign Intelligence agents operating within the U.S., and
cooperates with the National Reconnaissance Organization in the
surveillance of those involved in close encounters with UFOs and
extra-terrestrials.

Department of Energy Intelligence

(DOE-INTEL), which conducts internal
security checks and external security threat countermeasures, often through
its contract civilian instrumentality, the Wackenhut Corporation.

NSA's Central Security Service
and
CIA's Special Security Office

Which respectively spy on the spies, and
conduct special operations which cannot be entrusted to line intelligence
officers, Ft. Meade, MD and Langley, VA.

(DIA), which coordinates the intelligence
data gathered from the various Armed Services intelligence branches (Army,
Navy, Marines, Air Force, Coast Guard and Special Forces), and provides
counter-threat measures, (which include providing security at
ultra-classified installations by the deployment of U.S. "Thought
Police", who conduct surveillance, by remote viewing and other
para-psychological measures, against penetrations and scanning by foreign
or civilian remote viewers [clairvoyants/out-of-body seers], Pentagon, VA,
Fort Meade, MD, and the entire astral plane.

NASA Intelligence

Which gathers intelligence data relating
to space flights, sabotage threats, astronaut and reconnaissance satellite
encounters with UFOs and ETs, and coordinates the transfer of alien
technology to U.S. and allies' aerospace operations.

Air Force Special Security Service

Which is an NSA/USAF joint intelligence
operations unit dealing with possible threats to aerospace operations from
foreign powers, terrestrial or otherwise.

Defense Industry Security Command

(DISCO), which conducts intelligence
operations within and on behalf of the civilian defense contractor
corporations engaged in classified research, development, and production.

Defense Investigative Service

(DIS), which conducts investigations into
people and situations deemed a possible threat to any operation of the
Department of Defense.

Naval Investigative Service

(NIS), which conducts investigations
against threats to Naval operations.

Air Force Electronic Security Command

Which conducts surveillance and
interdiction of threats to the security of Air Force electronic
transmissions and telemetry, and to the integrity of electronic
countermeasure (ECM) warfare equipment.

Which coordinates intelligence relating
to threats against federal property and personnel.

Defense Electronic Security Command

Which coordinates intelligence
surveillance and countermeasures against threats to the integrity of
military electronic equipment and electronic battlefield operations), Fort
Worth, TX.

Project Deep Water

The ongoing effects of the compromised
personnel, sources and methods resulting from the secret importation of
Hitler's own Nazi Intelligence chief, Gen. Reinhard Gehlen, to redesign the
US's Intelligence apparatus.

Project Paperclip

The ongoing results of the secret
importation of Nazi weapons and aerospace/UFO scientists into U.S. secret
military research and development bases.

WAR DEPARTMENT

CIA's Directorate for
Science and
Technology

Which gathers information with promise
for scientific and technological developments which present a superiority
advantage for, or a threat against, the National Security, [also contains
the "Weird Desk", which centrally processes intelligence about
UFOs and ETs and their interaction with Earth], current Deputy Director of
Central Intelligence for Science and Technology is Ron Pandolfi.

Which are involved in nuclear warhead
"refinements", development of new transuranic elements for
weapons and energy applications, development of anti-matter weapons (the
Teller Bomb: 10,000 times the force of a hydrogen bomb), laser/maser
technology applications, and, reportedly, successful teleportation
experiments, among other projects, at this Russian nicknamed "City of
Death"), Livermore, CA.

Idaho National Engineering Laboratories

(INEL), which houses numerous underground
facilities in an immense desert installations complex larger than Rhode
Island, has security provided by its own secret Navy Base, is involved in
nuclear, high energy electromagnetic, and other research, and includes
Argonne National Laboratory, West), Arco, ID

Sandia National Laboratories (SNL)
Phillips Air Force Laboratory

Which are sequestered on Kirtland Air
Force Base/Sandia Military Reservation, and conduct the translation of
theoretical and experimental nuclear and Star Wars weapons research done at
Los Alamos and Lawrence Livermore National Laboratories into practical,
working weapons), Albuquerque, NM.

Cartel of private banks overseen by elite
super-wealthy financiers, such as the Rockefellers, Mellons, DuPonts,
Rothschilds, etc., which dictates to the Government the flow of money,
worth of money, and the interests rates.

CIA self-financing

The operation and/or control of much of
the international drug trade in heroin, cocaine and marijuana, as well as
"front" business enterprises, as a source of cash for
off-the-books covert operations, and the purchase of exotic munitions and
strategic bribe funds.

Department of Justice
self-financing

the use of confiscated money and
valuables from "targets of investigation" to finance
"special projects".

Special Forces
self-financing

The self-use of confiscated money from
covert military operations to fund other clandestine operations.

The Illuminati

A masonic
sect founded in Bavaria in 1776 that claimed the illuminating power of Christ
resided with it alone. (Collins Dictionary)

Date: Fri, 8
Feb 2002
From: David Weston

Subject:
Comprehensive info on 9/11

On Jan 8,a
group of protesters in San Francisco marched to the offices of Senator
Feinstein. A delegation met with Senator Feinstein and Senator Boxer.

Below is a
summary of the documents presented to Senators Feinstein and Boxer, in support
of the demand.

We provide a live link to your original material on your site (and
links via social networking services) - which raises your ranking on search
engines and helps spread your info further!

This site is published under Creative Commons (Attribution) CopyRIGHT
(unless an individual article or other item is declared otherwise by the copyright
holder). Reproduction for non-profit use is permitted
& encouraged - if you give attribution to the work & author and include
all links in the original (along with this or a similar notice).

Feel free to make non-commercial hard (printed) or software copies or
mirror sites - you never know how long something will stay glued to the web –
but remember attribution!

If you like what you see, please send a donation (no amount is too
small or too large) or leave a comment – and thanks for reading this far…

Live long and prosper! Together we can create the best of all possible
worlds…

Follow New Illuminati on Twitter

SUBSCRIBE to the NEW ILLUMINATI YOUTUBE CHANNEL

Contact Us

Welcome to the new Enlightenment, an era when suppressed science, hidden history and the enlightening nature of reality are all revealed to those with eyes to see and ears to hear.

These are the thoughts and ideas of New Illuminati - bold forerunners and pioneers of new awareness all over the globe.

Notes on new emerging paradigms from the NEXUS New Times Magazine Founder R. Ayana, who lives in a remote Australian rainforest (and is no longer involved with the magazine) - Catching drops from the deluge in a paper cup since 1984.

§ 107.Limitations on exclusive rights: Fair use Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include — (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.

This material is published under Creative Commons Copyright – reproduction for non-profit use is OK. Awesome Inc. theme. Powered by Blogger.

Claimer

All opinions, facts, debates and conjectures xpressed herein are xtrusions of macrocosmic consciousness into your field of awareness. The New Illuminati are not to be held responsible or accountable for flashes of insight, epiphany, curiosity, transformation or enlightenment experienced by any person, human or otherwise.